Posted on Thursday April 27, 2017
Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it's not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever since it was introduced to the market. Here are five tips to combat VoIP eavesdropping:
Posted on Wednesday April 26, 2017
Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you're an avid Microsoft Word user, here's what you need to know about the bug.
Posted on Tuesday April 25, 2017
Creators Update contains the most significant upgrades to Microsoft's Windows 10. Some of the stand-out features include application enhancements, improved user experience, and a few productivity features that may seem too small to be noticed. These upgrades were recently rolled out, giving reason to personal and business users alike to get excited.
Posted on Monday April 24, 2017
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice for how to avoid the newest trend in phishing.
Posted on Friday April 21, 2017
Mac Pro users have long awaited the release date of the new workstation, and who could blame them when the current model has been available since 2013. Thankfully, Apple just confirmed that the revamped Mac Pro is on its way. From specs, features, and design changes, here's the latest information we have about Apple's high-end desktop.
Posted on Thursday April 20, 2017
There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even close business deals. As mobile devices became indispensable in everyone's personal and professional life, the security risks have also increased -- and backing up became more critical than ever.